Can a firewall block attacks using server scripts, such as the attack in which the user could change a price on an item offered by an e-commerce site? Why or why not?

What will be an ideal response?

Although
the
firewall
could
do
this
kind
of
filtering,
in
theory,
supporting
that
amount
of
detail
would
add
significant
complexity
to
the
firewall.

Computer Science & Information Technology

You might also like to view...

A database object that displays a subset of data in response to a specific question

A) Query B) Form C) Table

Computer Science & Information Technology

Access specified by the public, private or protected keywords, remains in affect ____.

A. Only until the statement that following it is executed. B. Only until the methods in which it is defined is executed. C. Until either the end of the class is reached or a different level of encapsulation is specified. D. None of the above

Computer Science & Information Technology